KNOWLEDGE BASE

New NIS2 requirements for cyber hygiene

Research shows that over 90% of all incidents start with a human element. As a response, the EU has included cyber hygiene practices and cyber security training as part of the NIS2 Directive.

keep it clean

Cyber hygiene measures

Cyber hygiene refers to the measures individuals and organizations take to maintain good cyber security health and protect their digital environments from cyber threats. It involves taking proactive and preventive steps to reduce the risk of cyberattacks and ensure the overall security of information systems.

memo-circle-check-regular

Article 21 (2g)

Basic cyber hygiene practices and cyber security training.

Download our
NIS2 Reference Guide

lower your risk

Key aspects of cyber hygiene

Data backups

Access control

IoT security

Mobile security

Password management

Software updates & patching

Secure Wi-Fi best practices

Incident response planning

Secure web browsing

Compliance with regulations

Phishing awareness & employee training

Firewall & security software
(e.g. anti-virus)

"Holm Security has become an integral part of our cyber security strategy, helping us protect client data, meet compliance requirements, and maintain operational resilience."
Victor Jerlin
Victor Jerlin
CTO, Co-founder, Internet Vikings
"Since implementing Holm Security's Next-Gen Vulnerability Management Platform, we continuously monitor vulnerabilities and know where we are vulnerable."
Emir Saffar
Emir Saffar
CISO, Ur&Penn
"The data and visibility we've received from Holm Security's platform have allowed us to set up regular scanning of our OT environment, reduce our risk score, and remove vulnerabilities - from software and hardware alike. I'm very happy with the progress we've made, and our CSM is always on hand when needed."
Henrik Linder - circle v2
Henrik Linder
Network Engineer,
AB Kristianstadsbyggen
"Holm Security's Customer Success and Support & Delivery teams have been instrumental in helping us interpret and act on the extensive data gathered from our IT environment scans. Their guidance has enabled us to transform raw scan results into meaningful insights, giving us a clear, comprehensive overview of our infrastructure. We can now effectively prioritize our assets and vulnerabilities based on business relevance, significantly improving our ability to manage risk and maintain a stronger security posture."
Henri Scerri - Xara Collection circle
Henri Scerri
Group IT Manager, The Xara Collection
"With Holm Security, we identify vulnerabilities as they emerge in our environment and gain deep insight into their severity, exploitability, and business impact. The platform delivers clear and actionable remediation guidance, enabling us to prioritize risks correctly and address them efficiently."
Odd-Arne Haraldsen - circle
Odd-Arne Haraldsen
IT Operations Manager,
Svenljunga kommun
"Both the platform and the support have worked well from the start. From network and web application scanning to Customer Success, Holm Security delivers what we need."
Robert Thel
Robert Thel
IT-säkerhetssamordnare,
Ljungby kommun
"Holm Security has helped us bring structure to our cyber security work and stay focused on what matters most across real‑estate environments in the Benelux. With regular guidance from our CSM, seamless collaboration between Holm Security and our MSP, and increased visibility across our systems, networks, web applications, and employees, we now have clarity and a clear path toward greater cyber maturity."
Bonne Gerritsma
IT Manager, Wereldhave
As Scandinavia's largest port, maintaining uninterrupted delivery is essential, and Holm Security’s platform has helped us secure our environments with confidence. We now have visibility and control of our attack surface - internal, external, and web - ensuring our operations are covered. Their interface and customer support make proactive vulnerability management a reliable part of our operations."
Robert Jaganjac
IT Specialist, Göteborgs Hamn
"We now know exactly where the vulnerabilities are across our attack surface and how to best allocate our time. We can dig deeper into each vulnerability to see what actions need to be taken - where, how, and by whom. For the vulnerabilities our suppliers need to address, Holm Security provides the data they need so that we can avoid cyber incidents, secure data, and stay compliant."
Helge Meland
IT Consultant, Gran Kommune
"The Holm Security platform has enabled us to cover more of our attack surface, and we continue to expand coverage with additional scan types, while prioritizing remediation in a way that works for us. Paired with regular conversations with our CSM about new features and workflows, the platform keeps us compliant with NIS2 and other regulations."
Andreas Melander
IT Specialist, Tidaholms Energi
"NIS2, data protection policies, and service disruption prevention are among the reasons we needed a vulnerability management platform that was both easy to use and technically robust. The Holm Security platform meets those requirements, and with help from their Customer Success team, we can tailor workflows to make remediation more efficient."
Erik Wellander
IT Manager, HML Haga Mölndal Lastbilcentral

We'll help you comply with the NIS2 Directive.

Get started today.